Show simple item record

dc.contributor.authorGhosh, Supriyo
dc.contributor.authorJaillet, Patrick
dc.date.accessioned2022-07-13T15:14:43Z
dc.date.available2022-07-13T15:14:43Z
dc.date.issued2022
dc.identifier.urihttps://hdl.handle.net/1721.1/143703
dc.language.isoen
dc.publisherElsevier BVen_US
dc.relation.isversionof10.1016/J.COR.2021.105558en_US
dc.rightsCreative Commons Attribution-NonCommercial-NoDerivs Licenseen_US
dc.rights.urihttp://creativecommons.org/licenses/by-nc-nd/4.0/en_US
dc.sourcearXiven_US
dc.titleAn iterative security game for computing robust and adaptive network flowsen_US
dc.typeArticleen_US
dc.identifier.citationGhosh, Supriyo and Jaillet, Patrick. 2022. "An iterative security game for computing robust and adaptive network flows." Computers and Operations Research, 138.
dc.contributor.departmentMassachusetts Institute of Technology. Department of Electrical Engineering and Computer Science
dc.relation.journalComputers and Operations Researchen_US
dc.eprint.versionOriginal manuscripten_US
dc.type.urihttp://purl.org/eprint/type/JournalArticleen_US
eprint.statushttp://purl.org/eprint/status/NonPeerRevieweden_US
dc.date.updated2022-07-13T15:09:26Z
dspace.orderedauthorsGhosh, S; Jaillet, Pen_US
dspace.date.submission2022-07-13T15:09:27Z
mit.journal.volume138en_US
mit.licensePUBLISHER_CC
mit.metadata.statusAuthority Work and Publication Information Neededen_US


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record